Skip to content

accesscontextmanager.v1beta1.accessContextManagerServicePerimeter

Index

Fields

fn new

new(name)

new returns an instance of AccessContextManagerServicePerimeter

obj metadata

"ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create."

fn metadata.withAnnotations

withAnnotations(annotations)

"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"

fn metadata.withAnnotationsMixin

withAnnotationsMixin(annotations)

"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"

Note: This function appends passed data to existing values

fn metadata.withClusterName

withClusterName(clusterName)

"The name of the cluster which the object belongs to. This is used to distinguish resources with same name and namespace in different clusters. This field is not set anywhere right now and apiserver is going to ignore it if set in create or update request."

fn metadata.withCreationTimestamp

withCreationTimestamp(creationTimestamp)

"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."

fn metadata.withDeletionGracePeriodSeconds

withDeletionGracePeriodSeconds(deletionGracePeriodSeconds)

"Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only."

fn metadata.withDeletionTimestamp

withDeletionTimestamp(deletionTimestamp)

"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."

fn metadata.withFinalizers

withFinalizers(finalizers)

"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."

fn metadata.withFinalizersMixin

withFinalizersMixin(finalizers)

"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."

Note: This function appends passed data to existing values

fn metadata.withGenerateName

withGenerateName(generateName)

"GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.\n\nIf this field is specified and the generated name exists, the server will NOT return a 409 - instead, it will either return 201 Created or 500 with Reason ServerTimeout indicating a unique name could not be found in the time allotted, and the client should retry (optionally after the time indicated in the Retry-After header).\n\nApplied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency"

fn metadata.withGeneration

withGeneration(generation)

"A sequence number representing a specific generation of the desired state. Populated by the system. Read-only."

fn metadata.withLabels

withLabels(labels)

"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"

fn metadata.withLabelsMixin

withLabelsMixin(labels)

"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"

Note: This function appends passed data to existing values

fn metadata.withName

withName(name)

"Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names"

fn metadata.withNamespace

withNamespace(namespace)

"Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the \"default\" namespace, but \"default\" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.\n\nMust be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces"

fn metadata.withOwnerReferences

withOwnerReferences(ownerReferences)

"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."

fn metadata.withOwnerReferencesMixin

withOwnerReferencesMixin(ownerReferences)

"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."

Note: This function appends passed data to existing values

fn metadata.withResourceVersion

withResourceVersion(resourceVersion)

"An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.\n\nPopulated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency"

withSelfLink(selfLink)

"SelfLink is a URL representing this object. Populated by the system. Read-only.\n\nDEPRECATED Kubernetes will stop propagating this field in 1.20 release and the field is planned to be removed in 1.21 release."

fn metadata.withUid

withUid(uid)

"UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.\n\nPopulated by the system. Read-only. More info: http://kubernetes.io/docs/user-guide/identifiers#uids"

obj spec

fn spec.withDescription

withDescription(description)

"Description of the ServicePerimeter and its use. Does not affect\nbehavior."

fn spec.withPerimeterType

withPerimeterType(perimeterType)

"Immutable. Specifies the type of the Perimeter. There are two types: regular and\nbridge. Regular Service Perimeter contains resources, access levels,\nand restricted services. Every resource can be in at most\nONE regular Service Perimeter.\n\nIn addition to being in a regular service perimeter, a resource can also\nbe in zero or more perimeter bridges. A perimeter bridge only contains\nresources. Cross project operations are permitted if all effected\nresources share some perimeter (whether bridge or regular). Perimeter\nBridge does not contain access levels or services: those are governed\nentirely by the regular perimeter that resource is in.\n\nPerimeter Bridges are typically useful when building more complex\ntopologies with many independent perimeters that need to share some data\nwith a common perimeter, but should not be able to share data among\nthemselves. Default value: \"PERIMETER_TYPE_REGULAR\" Possible values: [\"PERIMETER_TYPE_REGULAR\", \"PERIMETER_TYPE_BRIDGE\"]."

fn spec.withResourceID

withResourceID(resourceID)

"Immutable. Optional. The name of the resource. Used for creation and acquisition. When unset, the value of metadata.name is used as the default."

fn spec.withTitle

withTitle(title)

"Human readable title. Must be unique within the Policy."

fn spec.withUseExplicitDryRunSpec

withUseExplicitDryRunSpec(useExplicitDryRunSpec)

"Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists\nfor all Service Perimeters, and that spec is identical to the status for those\nService Perimeters. When this flag is set, it inhibits the generation of the\nimplicit spec, thereby allowing the user to explicitly provide a\nconfiguration (\"spec\") to use in a dry-run version of the Service Perimeter.\nThis allows the user to test changes to the enforced config (\"status\") without\nactually enforcing them. This testing is done through analyzing the differences\nbetween currently enforced and suggested restrictions. useExplicitDryRunSpec must\nbet set to True if any of the fields in the spec are set to non-default values."

obj spec.accessPolicyRef

"The AccessContextManagerAccessPolicy this\nAccessContextManagerServicePerimeter lives in."

fn spec.accessPolicyRef.withExternal

withExternal(external)

"Allowed value: string of the format accessPolicies/{{value}}, where {{value}} is the name field of an AccessContextManagerAccessPolicy resource."

fn spec.accessPolicyRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.accessPolicyRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec

"Proposed (or dry run) ServicePerimeter configuration.\nThis configuration allows to specify and test ServicePerimeter configuration\nwithout enforcing actual access restrictions. Only allowed to be set when\nthe 'useExplicitDryRunSpec' flag is set."

fn spec.spec.withAccessLevels

withAccessLevels(accessLevels)

fn spec.spec.withAccessLevelsMixin

withAccessLevelsMixin(accessLevels)

Note: This function appends passed data to existing values

fn spec.spec.withEgressPolicies

withEgressPolicies(egressPolicies)

"List of EgressPolicies to apply to the perimeter. A perimeter may \nhave multiple EgressPolicies, each of which is evaluated separately.\nAccess is granted if any EgressPolicy grants it. Must be empty for \na perimeter bridge."

fn spec.spec.withEgressPoliciesMixin

withEgressPoliciesMixin(egressPolicies)

"List of EgressPolicies to apply to the perimeter. A perimeter may \nhave multiple EgressPolicies, each of which is evaluated separately.\nAccess is granted if any EgressPolicy grants it. Must be empty for \na perimeter bridge."

Note: This function appends passed data to existing values

fn spec.spec.withIngressPolicies

withIngressPolicies(ingressPolicies)

"List of 'IngressPolicies' to apply to the perimeter. A perimeter may\nhave multiple 'IngressPolicies', each of which is evaluated\nseparately. Access is granted if any 'Ingress Policy' grants it.\nMust be empty for a perimeter bridge."

fn spec.spec.withIngressPoliciesMixin

withIngressPoliciesMixin(ingressPolicies)

"List of 'IngressPolicies' to apply to the perimeter. A perimeter may\nhave multiple 'IngressPolicies', each of which is evaluated\nseparately. Access is granted if any 'Ingress Policy' grants it.\nMust be empty for a perimeter bridge."

Note: This function appends passed data to existing values

fn spec.spec.withResources

withResources(resources)

fn spec.spec.withResourcesMixin

withResourcesMixin(resources)

Note: This function appends passed data to existing values

fn spec.spec.withRestrictedServices

withRestrictedServices(restrictedServices)

"GCP services that are subject to the Service Perimeter\nrestrictions. Must contain a list of services. For example, if\n'storage.googleapis.com' is specified, access to the storage\nbuckets inside the perimeter must meet the perimeter's access\nrestrictions."

fn spec.spec.withRestrictedServicesMixin

withRestrictedServicesMixin(restrictedServices)

"GCP services that are subject to the Service Perimeter\nrestrictions. Must contain a list of services. For example, if\n'storage.googleapis.com' is specified, access to the storage\nbuckets inside the perimeter must meet the perimeter's access\nrestrictions."

Note: This function appends passed data to existing values

obj spec.spec.accessLevels

fn spec.spec.accessLevels.withExternal

withExternal(external)

"Allowed value: string of the format {{parent}}/accessLevels/{{value}}, where {{value}} is the name field of an AccessContextManagerAccessLevel resource."

fn spec.spec.accessLevels.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.accessLevels.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.egressPolicies

"List of EgressPolicies to apply to the perimeter. A perimeter may \nhave multiple EgressPolicies, each of which is evaluated separately.\nAccess is granted if any EgressPolicy grants it. Must be empty for \na perimeter bridge."

obj spec.spec.egressPolicies.egressFrom

"Defines conditions on the source of a request causing this 'EgressPolicy' to apply."

fn spec.spec.egressPolicies.egressFrom.withIdentities

withIdentities(identities)

fn spec.spec.egressPolicies.egressFrom.withIdentitiesMixin

withIdentitiesMixin(identities)

Note: This function appends passed data to existing values

fn spec.spec.egressPolicies.egressFrom.withIdentityType

withIdentityType(identityType)

"Specifies the type of identities that are allowed access to outside the \nperimeter. If left unspecified, then members of 'identities' field will \nbe allowed access. Possible values: [\"IDENTITY_TYPE_UNSPECIFIED\", \"ANY_IDENTITY\", \"ANY_USER_ACCOUNT\", \"ANY_SERVICE_ACCOUNT\"]."

obj spec.spec.egressPolicies.egressFrom.identities

fn spec.spec.egressPolicies.egressFrom.identities.withUser

withUser(user)

obj spec.spec.egressPolicies.egressFrom.identities.serviceAccountRef

fn spec.spec.egressPolicies.egressFrom.identities.serviceAccountRef.withExternal

withExternal(external)

"Allowed value: string of the format serviceAccount:{{value}}, where {{value}} is the email field of an IAMServiceAccount resource."

fn spec.spec.egressPolicies.egressFrom.identities.serviceAccountRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.egressPolicies.egressFrom.identities.serviceAccountRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.egressPolicies.egressTo

"Defines the conditions on the 'ApiOperation' and destination resources that \ncause this 'EgressPolicy' to apply."

fn spec.spec.egressPolicies.egressTo.withOperations

withOperations(operations)

"A list of 'ApiOperations' that this egress rule applies to. A request matches \nif it contains an operation/service in this list."

fn spec.spec.egressPolicies.egressTo.withOperationsMixin

withOperationsMixin(operations)

"A list of 'ApiOperations' that this egress rule applies to. A request matches \nif it contains an operation/service in this list."

Note: This function appends passed data to existing values

fn spec.spec.egressPolicies.egressTo.withResources

withResources(resources)

fn spec.spec.egressPolicies.egressTo.withResourcesMixin

withResourcesMixin(resources)

Note: This function appends passed data to existing values

obj spec.spec.egressPolicies.egressTo.operations

"A list of 'ApiOperations' that this egress rule applies to. A request matches \nif it contains an operation/service in this list."

fn spec.spec.egressPolicies.egressTo.operations.withMethodSelectors

withMethodSelectors(methodSelectors)

"API methods or permissions to allow. Method or permission must belong \nto the service specified by 'serviceName' field. A single MethodSelector \nentry with '*' specified for the 'method' field will allow all methods \nAND permissions for the service specified in 'serviceName'."

fn spec.spec.egressPolicies.egressTo.operations.withMethodSelectorsMixin

withMethodSelectorsMixin(methodSelectors)

"API methods or permissions to allow. Method or permission must belong \nto the service specified by 'serviceName' field. A single MethodSelector \nentry with '*' specified for the 'method' field will allow all methods \nAND permissions for the service specified in 'serviceName'."

Note: This function appends passed data to existing values

fn spec.spec.egressPolicies.egressTo.operations.withServiceName

withServiceName(serviceName)

"The name of the API whose methods or permissions the 'IngressPolicy' or \n'EgressPolicy' want to allow. A single 'ApiOperation' with serviceName \nfield set to '*' will allow all methods AND permissions for all services."

obj spec.spec.egressPolicies.egressTo.operations.methodSelectors

"API methods or permissions to allow. Method or permission must belong \nto the service specified by 'serviceName' field. A single MethodSelector \nentry with '*' specified for the 'method' field will allow all methods \nAND permissions for the service specified in 'serviceName'."

fn spec.spec.egressPolicies.egressTo.operations.methodSelectors.withMethod

withMethod(method)

"Value for 'method' should be a valid method name for the corresponding \n'serviceName' in 'ApiOperation'. If '*' used as value for method, \nthen ALL methods and permissions are allowed."

fn spec.spec.egressPolicies.egressTo.operations.methodSelectors.withPermission

withPermission(permission)

"Value for permission should be a valid Cloud IAM permission for the \ncorresponding 'serviceName' in 'ApiOperation'."

obj spec.spec.egressPolicies.egressTo.resources

obj spec.spec.egressPolicies.egressTo.resources.projectRef

fn spec.spec.egressPolicies.egressTo.resources.projectRef.withExternal

withExternal(external)

"Allowed value: string of the format projects/{{value}}, where {{value}} is the number field of a Project resource."

fn spec.spec.egressPolicies.egressTo.resources.projectRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.egressPolicies.egressTo.resources.projectRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.ingressPolicies

"List of 'IngressPolicies' to apply to the perimeter. A perimeter may\nhave multiple 'IngressPolicies', each of which is evaluated\nseparately. Access is granted if any 'Ingress Policy' grants it.\nMust be empty for a perimeter bridge."

obj spec.spec.ingressPolicies.ingressFrom

"Defines the conditions on the source of a request causing this 'IngressPolicy'\nto apply."

fn spec.spec.ingressPolicies.ingressFrom.withIdentities

withIdentities(identities)

fn spec.spec.ingressPolicies.ingressFrom.withIdentitiesMixin

withIdentitiesMixin(identities)

Note: This function appends passed data to existing values

fn spec.spec.ingressPolicies.ingressFrom.withIdentityType

withIdentityType(identityType)

"Specifies the type of identities that are allowed access from outside the \nperimeter. If left unspecified, then members of 'identities' field will be \nallowed access. Possible values: [\"IDENTITY_TYPE_UNSPECIFIED\", \"ANY_IDENTITY\", \"ANY_USER_ACCOUNT\", \"ANY_SERVICE_ACCOUNT\"]."

fn spec.spec.ingressPolicies.ingressFrom.withSources

withSources(sources)

"Sources that this 'IngressPolicy' authorizes access from."

fn spec.spec.ingressPolicies.ingressFrom.withSourcesMixin

withSourcesMixin(sources)

"Sources that this 'IngressPolicy' authorizes access from."

Note: This function appends passed data to existing values

obj spec.spec.ingressPolicies.ingressFrom.identities

fn spec.spec.ingressPolicies.ingressFrom.identities.withUser

withUser(user)

obj spec.spec.ingressPolicies.ingressFrom.identities.serviceAccountRef

fn spec.spec.ingressPolicies.ingressFrom.identities.serviceAccountRef.withExternal

withExternal(external)

"Allowed value: string of the format serviceAccount:{{value}}, where {{value}} is the email field of an IAMServiceAccount resource."

fn spec.spec.ingressPolicies.ingressFrom.identities.serviceAccountRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.ingressPolicies.ingressFrom.identities.serviceAccountRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.ingressPolicies.ingressFrom.sources

"Sources that this 'IngressPolicy' authorizes access from."

obj spec.spec.ingressPolicies.ingressFrom.sources.accessLevelRef

"An AccessLevel resource name that allow resources within the\nServicePerimeters to be accessed from the internet. AccessLevels\nlisted must be in the same policy as this ServicePerimeter.\nReferencing a nonexistent AccessLevel will cause an error. If no\nAccessLevel names are listed, resources within the perimeter can\nonly be accessed via Google Cloud calls with request origins within\nthe perimeter."

fn spec.spec.ingressPolicies.ingressFrom.sources.accessLevelRef.withExternal

withExternal(external)

"Allowed value: string of the format {{parent}}/accessLevels/{{value}}, where {{value}} is the name field of an AccessContextManagerAccessLevel resource."

fn spec.spec.ingressPolicies.ingressFrom.sources.accessLevelRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.ingressPolicies.ingressFrom.sources.accessLevelRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.ingressPolicies.ingressFrom.sources.projectRef

"(Optional) A Google Cloud resource that is allowed to ingress the\nperimeter. Requests from these resources will be allowed to access\nperimeter data. Currently only projects are allowed. Format\n\"projects/{project_number}\" The project may be in any Google Cloud\norganization, not just the organization that the perimeter is defined in."

fn spec.spec.ingressPolicies.ingressFrom.sources.projectRef.withExternal

withExternal(external)

"Allowed value: string of the format projects/{{value}}, where {{value}} is the number field of a Project resource."

fn spec.spec.ingressPolicies.ingressFrom.sources.projectRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.ingressPolicies.ingressFrom.sources.projectRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.ingressPolicies.ingressTo

"Defines the conditions on the 'ApiOperation' and request destination that cause\nthis 'IngressPolicy' to apply."

fn spec.spec.ingressPolicies.ingressTo.withOperations

withOperations(operations)

"A list of 'ApiOperations' the sources specified in corresponding 'IngressFrom' \nare allowed to perform in this 'ServicePerimeter'."

fn spec.spec.ingressPolicies.ingressTo.withOperationsMixin

withOperationsMixin(operations)

"A list of 'ApiOperations' the sources specified in corresponding 'IngressFrom' \nare allowed to perform in this 'ServicePerimeter'."

Note: This function appends passed data to existing values

fn spec.spec.ingressPolicies.ingressTo.withResources

withResources(resources)

fn spec.spec.ingressPolicies.ingressTo.withResourcesMixin

withResourcesMixin(resources)

Note: This function appends passed data to existing values

obj spec.spec.ingressPolicies.ingressTo.operations

"A list of 'ApiOperations' the sources specified in corresponding 'IngressFrom' \nare allowed to perform in this 'ServicePerimeter'."

fn spec.spec.ingressPolicies.ingressTo.operations.withMethodSelectors

withMethodSelectors(methodSelectors)

"API methods or permissions to allow. Method or permission must belong to \nthe service specified by serviceName field. A single 'MethodSelector' entry \nwith '*' specified for the method field will allow all methods AND \npermissions for the service specified in 'serviceName'."

fn spec.spec.ingressPolicies.ingressTo.operations.withMethodSelectorsMixin

withMethodSelectorsMixin(methodSelectors)

"API methods or permissions to allow. Method or permission must belong to \nthe service specified by serviceName field. A single 'MethodSelector' entry \nwith '*' specified for the method field will allow all methods AND \npermissions for the service specified in 'serviceName'."

Note: This function appends passed data to existing values

fn spec.spec.ingressPolicies.ingressTo.operations.withServiceName

withServiceName(serviceName)

"The name of the API whose methods or permissions the 'IngressPolicy' or \n'EgressPolicy' want to allow. A single 'ApiOperation' with 'serviceName' \nfield set to '*' will allow all methods AND permissions for all services."

obj spec.spec.ingressPolicies.ingressTo.operations.methodSelectors

"API methods or permissions to allow. Method or permission must belong to \nthe service specified by serviceName field. A single 'MethodSelector' entry \nwith '*' specified for the method field will allow all methods AND \npermissions for the service specified in 'serviceName'."

fn spec.spec.ingressPolicies.ingressTo.operations.methodSelectors.withMethod

withMethod(method)

"Value for method should be a valid method name for the corresponding \nserviceName in 'ApiOperation'. If '*' used as value for 'method', then \nALL methods and permissions are allowed."

fn spec.spec.ingressPolicies.ingressTo.operations.methodSelectors.withPermission

withPermission(permission)

"Value for permission should be a valid Cloud IAM permission for the \ncorresponding 'serviceName' in 'ApiOperation'."

obj spec.spec.ingressPolicies.ingressTo.resources

obj spec.spec.ingressPolicies.ingressTo.resources.projectRef

fn spec.spec.ingressPolicies.ingressTo.resources.projectRef.withExternal

withExternal(external)

"Allowed value: string of the format projects/{{value}}, where {{value}} is the number field of a Project resource."

fn spec.spec.ingressPolicies.ingressTo.resources.projectRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.ingressPolicies.ingressTo.resources.projectRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.resources

obj spec.spec.resources.projectRef

fn spec.spec.resources.projectRef.withExternal

withExternal(external)

"Allowed value: string of the format projects/{{value}}, where {{value}} is the number field of a Project resource."

fn spec.spec.resources.projectRef.withName

withName(name)

"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names"

fn spec.spec.resources.projectRef.withNamespace

withNamespace(namespace)

"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/"

obj spec.spec.vpcAccessibleServices

"Specifies how APIs are allowed to communicate within the Service\nPerimeter."

fn spec.spec.vpcAccessibleServices.withAllowedServices

withAllowedServices(allowedServices)

"The list of APIs usable within the Service Perimeter.\nMust be empty unless 'enableRestriction' is True."

fn spec.spec.vpcAccessibleServices.withAllowedServicesMixin

withAllowedServicesMixin(allowedServices)

"The list of APIs usable within the Service Perimeter.\nMust be empty unless 'enableRestriction' is True."

Note: This function appends passed data to existing values

fn spec.spec.vpcAccessibleServices.withEnableRestriction

withEnableRestriction(enableRestriction)

"Whether to restrict API calls within the Service Perimeter to the\nlist of APIs specified in 'allowedServices'."